A secure end-to-end IoT solution

Avijit Mathur, Thomas Newe, Walid Elgenaidi, Muzaffar Rao, Gerard Dooly, Daniel Toal

Research output: Contribution to journalArticlepeer-review

Abstract

The Internet of Things (IoT) has been expanding in recent years with advancements in technologies, techniques and devices. This expansion has led to several different applications in the medical, civil, marine, military and domestic domains. Each of these domains have different requirements and challenges, with one common denominator: data security. Data security is an important aspect for any IoT network, however, in modern IoT systems simple data security may be not sufficient. This paper looks at a secure end-to-end IoT solution that allows wireless sensors/devices to connect to any PC in the world while guaranteeing data and network security. The scheme proposed in this paper can protect an IoT solution against several attacks like data breach, Denial of Service (DoS) and unauthorized access. Results obtained show that the technologies implemented, or used are superior in terms of time and energy consumption when compared to their counterparts in previously published works.

Original languageEnglish
Pages (from-to)291-299
Number of pages9
JournalSensors and Actuators, A: Physical
Volume263
DOIs
Publication statusPublished - 15 Aug 2017

Keywords

  • Data Breach
  • ECDH (Elliptic Curve Diffie-Hellman)
  • HKDF (HMAC based Key Derivation Function)
  • Secure IoT
  • Sensor networks
  • WSN security

Fingerprint

Dive into the research topics of 'A secure end-to-end IoT solution'. Together they form a unique fingerprint.

Cite this